distributed Virtual Environment (DVE) systems have become more and more important both in academic communities and the industries. To guarantee the load constrain, the physical world integrity and the virtual world in...
详细信息
distributed Virtual Environment (DVE) systems have become more and more important both in academic communities and the industries. To guarantee the load constrain, the physical world integrity and the virtual world integrity, the virtual environment should be divided into several parts and mapped to multiple servers, which are located in geographically different places. Many centralized algorithms based on regular cutting method are proposed to solve this problem. However, the dynamic property of clients and distributed property of the system make the existing algorithms unable to undertake it. In this paper, we propose a metric to measure the cutting quality and design a distributed mapping algorithm based on an irregular cutting. Simulation results show that our algorithm greatly decreases the costs of DVE systems for migration of clients and effectively improves the satisfaction degree of users.
As a typical social media in web2.0 era, blogs have become more and more important to information diffusion. Different from the traditional news, the information spread on blogs is primarily driven by users and their ...
详细信息
As a typical social media in web2.0 era, blogs have become more and more important to information diffusion. Different from the traditional news, the information spread on blogs is primarily driven by users and their relations. According to this phenomenon, this paper addresses the novel problem of measuring the influence of social structures on information diffusion. This paper extracts the hidden communities and information diffusion networks on blogs, and proposes a novel quantitative measurement to investigate the influence of social networks structure on diffusion networks. The proposed methods measure the influence by utilizing a simple but effective graph similarity measuring method. The experiments demonstrate the effectiveness of the proposed algorithms and measurements, and discover the correlation between social networks and the diffusion of the "interest" topics, which indicates the necessity of using social structures for information detection and tracking on blogs.
The paper presents a novel and synergistic system-level modeling approach based on aspect-oriented programming (AOP) and SystemC. A case study on a 128-bit binary floating-point adder is performed to demonstrate the m...
详细信息
The paper presents a novel and synergistic system-level modeling approach based on aspect-oriented programming (AOP) and SystemC. A case study on a 128-bit binary floating-point adder is performed to demonstrate the modeling strength of the approach. The validation experiment shows the effectiveness of the proposed approach. This work constitutes a first attempt to employ AOP in modeling digital systems.
Transaction of service composition has long-lived feature which a global-transaction is divided into several distributed sub-transactions. Atomicity property is preserved by using compensating transactions, which sema...
详细信息
To deal with the scalable and fast unbiased sampling problems in unstructured P2P systems, a sampling method based on multi-peer adaptive random walk (SMARW) is proposed. In the method, based on the multi-peer random ...
详细信息
This paper presents a novel algorithm to detect null pointer dereference errors. The algorithm utilizes both of the must and may alias information in a compact way to improve the precision of the detection. Using may ...
详细信息
ISBN:
(纸本)9783540884781
This paper presents a novel algorithm to detect null pointer dereference errors. The algorithm utilizes both of the must and may alias information in a compact way to improve the precision of the detection. Using may alias information obtained by a fast flow- and context- insensitive analysis algorithm, we compute the must alias generated by the assignment statements and the must alias information is also used to improve the precision of the may alias. We can strong update more expressions using the must alias information, which will reduce the false positives of the detection for null pointer dereference. We have implemented our algorithm in the SUIF2 compiler infrastructure and the experiments results are as expected.
A Hohlraum-like configuration is proposed for realizing a simple compact source for neutrons. A laser pulse enters a tiny thin-shelled hollow-sphere target through a small opening and is self-consistently trapped in t...
详细信息
A Hohlraum-like configuration is proposed for realizing a simple compact source for neutrons. A laser pulse enters a tiny thin-shelled hollow-sphere target through a small opening and is self-consistently trapped in the cavity. The electrons in the inner shell-wall region are expelled by the light pressure. The resulting space-charge field compresses the local ions into a thin layer that becomes strongly heated. An inward expansion of ions into the shell cavity then occurs, resulting in the formation at the cavity center of a hot spot of ions at high density and temperature, similar to that in inertial electrostatic confinement.
The high-quality network reconstruction from metabolites, enzymes and reactions is the first essential step for the studies on the metabolic networks. Previously the approach based on the KEGG/LIGAND database can only...
详细信息
The high-quality network reconstruction from metabolites, enzymes and reactions is the first essential step for the studies on the metabolic networks. Previously the approach based on the KEGG/LIGAND database can only reconstruct the organism-level metabolic networks and the network quality is quite doubtful. In this paper we propose a new recursive approach to reconstruct metabolic networks. The data selection mechanism of KEGG/PATHWAY ensures that metabolic networks are parsimonious but reliable. The KO system makes it possible to generate networks hierarchically. The KEGG web service manages to keep the data up-to-date. Results of comparison with the previous approach show our new approach is practical and reliable.
This paper presents a novel algorithm to detect null pointer dereference errors. The algorithm utilizes both of the must and may alias information in a compact way to improve the precision of the detection. Using may ...
详细信息
Multiprocessor architectures are becoming more attractive for embedded systems, and also for multimedia embedded systems. In multimedia embedded systems, there exist both hard real-time tasks and multimedia stream wit...
详细信息
暂无评论